SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 476500 of 800 papers

TitleStatusHype
Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System0
Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration0
Deep Transfer Learning: A Novel Collaborative Learning Model for Cyberattack Detection Systems in IoT Networks0
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion DetectionCode0
A Comparative Analysis of Machine Learning Techniques for IoT Intrusion Detection0
Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic ApproachCode0
A Hybrid Approach for an Interpretable and Explainable Intrusion Detection System0
A Dynamic Watermarking Algorithm for Finite Markov Decision Problems0
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection0
Intrusion Detection: Machine Learning Baseline Calculations for Image Classification0
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks0
Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold0
Orthogonal variance-based feature selection for intrusion detection systems0
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods0
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks0
An Efficient Anomaly Detection Approach using Cube Sampling with Streaming Data0
Automating Privilege Escalation with Deep Reinforcement Learning0
From Zero-Shot Machine Learning to Zero-Day Attack Detection0
Evaluating the Robustness of Time Series Anomaly and Intrusion Detection Methods against Adversarial Attacks0
LSTM Hyper-Parameter Selection for Malware Detection: Interaction Effects and Hierarchical Selection Approach0
A Novel Online Incremental Learning Intrusion Prevention System0
Modern Cybersecurity Solution using Supervised Machine Learning0
Integrating Sensing and Communication in Cellular Networks via NR Sidelink0
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT0
Feature Analysis for Machine Learning-based IoT Intrusion Detection0
Show:102550
← PrevPage 20 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified